Network Security (6) Flashcards

1
Q

Which of the following is not a characteristic of a smurf attack?

Uses the Internet Control Message Protocol

Uses broadcast transmissions

Uses a botnet to bombard the target with traffic

A

Uses a botnet to bombard the target with traffic

A smurf attack does not use a botnet, which is a group of computers running a remote control malware program without their owners knowing it. The computers participating in a smurf attack are simply processing traffic as they normally would. A smurf attack involves flooding a network with the same ICMP Echo Request messages used by ping but sent to the network’s broadcast address. These messages are also spoofed; the source address field contains the IP address of the computer that is the intended victim. This way, all of the computers receiving the broadcast will send their responses to the victim, flooding its in-buffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following types of attacks can be used to enable an intruder to access a wireless network despite the protection provided by MAC filtering?

Spoofing

Brute force

DNS poisoning

A

Spoofing

Spoofing is the process of modifying network packets to make them appear as though they are transmitted by or addressed to someone else. One way of doing this is to modify the MAC address in the packets to one that is approved by the MAC filter. Brute force is the method of repeated guessing, which is impractical with MAC addresses. DNS works with IP addresses, not MAC addresses. War driving is the process of looking for unprotected wireless access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following terms refers to a type of denial-of-service (DoS) attack that uses multiple computers to bombard a target server with traffic?

Amplified

Reflective

Distributed

A

Distributed

A distributed denial-of-service (DDoS) attack is one in which the attacker uses hundreds or thousands of computers, controlled by malware and called zombies, to send traffic to a single server or website, in an attempt to overwhelm it and prevent it from functioning. An amplified DoS attack is one in which the messages sent by the attacker require an extended amount of processing by the target servers, increasing the burden on them more than simpler messages would. A reflective DoS attack is one in which the attacker sends requests containing the target server’s IP address to legitimate servers on the Internet, such as DNS servers, causing them to send a flood of responses to the target. A permanent DoS attack is one in which the attacker actually damages the target system and prevents it from functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following terms refers to a type of denial-of-service (DoS) attack that bombards a target server with traffic that requires a large amount of processing?

Amplified

Reflective

Distributed

A

Amplified

An amplified DoS attack is one in which the messages sent by the attacker require an extended amount of processing by the target servers, increasing the burden on them more than simpler messages would. A reflective DoS attack is one in which the attacker sends requests containing the target server’s IP address to legitimate servers on the Internet, such as DNS servers, causing them to send a flood of responses to the target. A distributed denial-of-service (DDoS) attack is one in which the attacker uses hundreds or thousands of computers, controlled by malware and called zombies, to send traffic to a single server or website, in an attempt to overwhelm it and prevent it from functioning. A permanent DoS attack is one in which the attacker actually damages the target system and prevents it from functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following types of attacks are rarely seen anymore because of changes in device design that were specifically designed to prevent them? (Choose all correct answers.)

VLAN hopping

Logic bomb

Phishing

Smurf

A

VLAN hopping

Smurf

Smurf attacks rely on routers to forward broadcast traffic. Routers no longer forward broadcast messages, so smurf attacks have been rendered ineffective. In the same way, VLAN hopping, which is a method for sending commands to switches to transfer a port from one VLAN to another, is rarely seen because switches are now designed to prevent them. A logic bomb is a code insert placed into a legitimate software product that triggers a malicious event when specific conditions are met. Phishing is the term for a bogus email or website designed to infect users with some type of malware. Both of these are still commonly used attack types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following terms refers to a type of denial-of-service (DoS) attack that coerces other servers on the Internet into bombarding a target server with traffic?

Amplified

Reflective

Distributed

A

Reflective

A reflective DoS attack is one in which the attacker sends requests containing the target server’s IP address to legitimate servers on the Internet, such as DNS servers, causing them to send a flood of responses to the target. A distributed denial-of-service (DDoS) attack is one in which the attacker uses hundreds or thousands of computers, controlled by malware and called zombies, to send traffic to a single server or website, in an attempt to overwhelm it and prevent it from functioning. An amplified DoS attack is one in which the messages sent by the attacker require an extended amount of processing by the target servers, increasing the burden on them more than simpler messages would. A permanent DoS attack is one in which the attacker actually damages the target system and prevents it from functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following terms refers to a denial-of-service (DoS) attack in which an attacker breaks into a company’s datacenter and smashes its servers with a sledgehammer?

Reflective

Distributed

Permanent

A

Permanent

Although denial-of-service (DoS) attacks typically involve traffic flooding, any attack that prevents a server from functioning can be called a DoS attack. A permanent DoS attack is one in which the attacker actually damages the target system and prevents it from functioning. This can be a physical attack that damages the hardware, or the attacker can disable the server by altering its software or configuration settings. A distributed denial-of-service (DDoS) attack is one in which the attacker uses hundreds or thousands of computers, controlled by malware and called zombies, to send traffic to a single server or website, in an attempt to overwhelm it and prevent it from functioning. An amplified DoS attack is one in which the messages sent by the attacker require an extended amount of processing by the target servers, increasing the burden on them more than simpler messages would. A reflective DoS attack is one in which the attacker sends requests containing the target server’s IP address to legitimate servers on the Internet, such as DNS servers, causing them to send a flood of responses to the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technician in the IT department at your company was terminated today and had to be escorted from the building. Your supervisor has instructed you to disable all of the technician’s accounts, change all network device passwords to which the technician had access, and have the datacenter doors rekeyed. Which of the following terms best describes your supervisor’s concern in asking you to do these things?

Social engineering

Insider threats

Logic bombs

A

Insider threats

Your supervisor’s concern is that the disgruntled technician might take advantage of his access to devices and facilities to sabotage the network. When an individual takes advantage of information gathered during his or her employment, it is called an insider threat. Social engineering is a form of attack in which an innocent user is persuaded by an attacker to provide sensitive information via email or telephone. A logic bomb is a code insert placed into a legitimate software product that triggers a malicious event when specific conditions are met. War driving is an attack method that consists of driving around a neighborhood with a computer scanning for unprotected wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following terms refers to a denial-of-service (DoS) attack that involves zombies?

Amplified

Reflective

Distributed

A

Distributed

Distributed DoS attacks use hundreds or thousands of computers that have been infected with malware, called zombies, to flood a target server with traffic, in an attempt to overwhelm it and prevent it from functioning. A reflective DoS attack is one in which the attacker sends requests containing the target server’s IP address to legitimate servers on the Internet, such as DNS servers, causing them to send a flood of responses to the target. A reflective attack does not require infected computers; it takes advantage of the servers’ native functions. An amplified DoS attack is one in which the messages sent by the attacker require an extended amount of processing by the target servers, increasing the burden on them more than simpler messages would. A permanent DoS attack is one in which the attacker actually damages the target system and prevents it from functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following types of attacks can cause a user’s attempts to connect to an Internet website to be diverted to an attacker’s website instead?

ARP poisoning

Spoofing

DNS poisoning

A

DNS poisoning

DNS poisoning is a type of attack in which an attacker adds fraudulent information into the cache of a DNS server. Then, when a client attempts to resolve the name of a website or other server, the DNS server supplies the incorrect IP address, causing the client to access the attacker’s server instead. An evil twin is a rogue wireless access point on a network. ARP poisoning is the deliberate insertion of fraudulent information into the ARP cache stored on computers and switches, which can interfere with the resolution of IP addresses into MAC addresses on a local level. Spoofing is the process of modifying network packets to make them appear as though they are transmitted by or addressed to someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following functions can be interfered with by a DNS poisoning attack?

IP address resolution

Name resolution

Password protection

A

Name resolution

DNS poisoning is a type of attack in which an attacker adds fraudulent information into the cache of a DNS server. This can interfere with the name resolution process by causing a DNS server to supply the incorrect IP address for a specified name. The process of resolving an IP address into a MAC address can be interfered with by ARP poisoning. DNS has nothing to do with passwords or switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements best describes the difference between an exploit and a vulnerability?

An exploit is a potential weakness in software and a vulnerability is a potential weakness in hardware.

A vulnerability is a potential weakness in a system and an exploit is a hardware or software element that is designed to take advantage of a vulnerability.

An exploit is a potential weakness in a system and a vulnerability is a hardware or software element that is designed to take advantage of a vulnerability.

A

A vulnerability is a potential weakness in a system and an exploit is a hardware or software element that is designed to take advantage of a vulnerability.

A vulnerability is a weakness, whether in software or hardware, of which an exploit is designed to take advantage. Neither term is specific to hardware or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In testing the new application he has designed, Ralph has discovered that it contains a weakness that could enable an attacker to gain full administrative access. Which of the following is another term for this weakness?

Exploit

Mitigation

Vulnerability

A

Vulnerability

A vulnerability is a potential weakness in a system that an attacker can use to his or her advantage. An exploit is a hardware or software element that is designed to take advantage of a vulnerability. A mitigation is a form of defense against attacks on system security. A honeypot is a computer configured to function as bait for attackers, causing them to waste their time penetrating a resource that provides no significant access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An early form of denial-of-service (DoS) attack called for the attacker to bombard the network with altered ping requests sent to the broadcast address. Which of the following is the name of this type of attack?

Smurf

Phishing

Evil twin

A

Smurf

In a smurf attack, the attacker sends ping requests, which use the Internet Control Message Protocol (ICMP), to the broadcast address. The request messages are altered to appear as though sent by the designated target so that all of the replies are sent to that system. Phishing is the term for a bogus email or website designed to infect users with some type of malware. An evil twin is a fraudulent access point on a wireless network. A fraggle attack is similar to a smurf attack, except that it uses User Datagram Protocol (UDP) traffic instead of ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following attack types is similar to a smurf attack, except that it uses a different protocol to generate its traffic?

Evil twin

Logic bomb

Fraggle

A

Fraggle

A fraggle attack is similar to a smurf attack in that the attacker generates a large amount of spoofed broadcast traffic that appears to have been sent by the target system. All of the replies to the broadcasts are then transmitted to the target. The difference between a fraggle and a smurf attack is that a fraggle attack uses User Datagram Protocol (UDP) traffic instead of ICMP. Phishing is the term for a bogus email or website designed to infect users with some type of malware. An evil twin is a fraudulent access point on a wireless network. A logic bomb is a code insert placed into a legitimate software product that triggers a malicious event when specific conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following types of attacks have been rendered all but obsolete by the routers that no longer forward broadcast traffic? (Choose all correct answers.)

Logic bomb

Fraggle

Phishing

Smurf

A

Fraggle

Smurf

Fraggle attacks and smurf attacks are similar in that they both rely on routers to forward broadcast traffic. In both of these attacks, the attacker generates a large amount of spoofed broadcast traffic that appears to have been sent by the target system. All of the replies to the broadcasts are then transmitted to the target. Routers no longer forward broadcast messages, so fraggle and smurf attacks have been rendered ineffective. A logic bomb is a code insert placed into a legitimate software product that triggers a malicious event when specific conditions are met. Phishing is the term for a bogus email or website designed to infect users with some type of malware

17
Q

A senior IT administrator at your company was terminated two weeks ago. Today, Friday, you arrived at the office and found that all of the hosts in the web server farm had their data deleted. There are no unauthorized entries to the datacenter recorded, but you suspect the terminated administrator to be responsible. Which of the following attack types might the administrator have directed at the web server farm?

ARP poisoning

Evil twin

Logic bomb

A

Logic bomb

A logic bomb is a code insert placed into a legitimate software product that triggers a malicious event when specific conditions are met. The terminated administrator might have created code designed to trigger the deletions after the administrator’s departure from the company. Social engineering is a form of attack in which an innocent user is persuaded by an attacker to provide sensitive information via email or telephone. The Address Resolution Protocol (ARP) is responsible for resolving IP addresses into media access control (MAC) addresses. ARP poisoning is the deliberate insertion of fraudulent information into the ARP cache stored on computers and switches. An evil twin is a fraudulent access point on a wireless network

18
Q

Which of the following attack types can be facilitated by ARP poisoning? (Choose all correct answers.)

Evil twin

Man in the middle

Session hijacking

Social engineering

A

Man in the middle

Session hijacking

ARP poisoning is the deliberate insertion of fraudulent information into the ARP cache stored on computers and switches. This can enable an attacker to intercept traffic intended for another system. In a man-in-the-middle attack, the attacker can read the intercepted traffic and even modify it before sending it on to the destination. In a session hijacking attack, the attacker can use the intercepted traffic to obtain authentication information, including passwords. An evil twin is a fraudulent access point on a wireless network. Social engineering is a form of attack in which an innocent user is persuaded by an attacker to provide sensitive information via email or telephone

19
Q

Which of the following attack types describes the practice of seeking out unprotected wireless networks?

War driving

Phishing

Brute force

A

War driving

War driving is an attack method that consists of driving around a neighborhood with a computer scanning for unprotected wireless networks. A brute-force attack is one in which an attacker uses repeated guesses to find a password, an open port, or some other type of sensitive data. Phishing is the term for a bogus email or website designed to infect users with some type of malware. Social engineering is the practice of obtaining sensitive data by contacting users and pretending to be someone with a legitimate need for that data

20
Q

Which of the following statements best describes a type of replay attack?

A type of attack in which an intruder reenters a resource previously compromised by another intruder

A type of attack in which an intruder retransmits captured authentication packets to gain access to a secured resource

A type of attack in which an intruder uses the same technique that provided access to other resources to penetrate a new resource

A

A type of attack in which an intruder retransmits captured authentication packets to gain access to a secured resource

A replay attack is one in which an attacker utilizes the information found in previously captured packets to gain access to a secured resource. In many cases, the captured packets contain authentication data. In this way, the attacker can make use of captured passwords, even when they are encrypted and cannot be read. The other options all describe valid attack methodologies, but they are not called replay attacks

21
Q

Ed receives an email through his personal account, warning him that his checking account has been locked due to excessive activity. To confirm that the activity is fraudulent, the email instructs Ed to click the enclosed hyperlink, log on to his account, and review the list of charges. Ed clicks the link and is taken to a web page that appears to be that of his bank. He then supplies his username and password to log on. Which of the following types of attacks is Ed likely to be experiencing?

Social engineering

Phishing

Logic bomb

A

Phishing

This is a classic example of a phishing scam. In all likelihood, the link in the email Ed received has taken him not to the real website of his bank, but rather a duplicate created by an attacker. By supplying his logon credentials, he is in effect giving them to the attacker, who can now gain access to his real bank account. Social engineering is the practice of obtaining sensitive data by contacting users and pretending to be someone with a legitimate need for that data. A logic bomb is a code insert placed into a legitimate software product that triggers a malicious event when specific conditions are met. Spoofing is the process of modifying network packets to make them appear as though they are transmitted by or addressed to someone else

22
Q

Which of the following attack types are specifically directed at wireless networks? (Choose all correct answers.)

Evil twin

Phishing

Deauthentication

War driving

A

Evil twin

Deauthentication

War driving

An evil twin is a fraudulent access point on a wireless network that mimics the SSID of a legitimate access point, in the hope of luring in users. War driving is an attack method that consists of driving around a neighborhood with a computer scanning for unprotected wireless networks. Deauthentication is a type of denial-of-service (DoS) attack in which the attacker targets a wireless client by sending a deauthentication frame that causes the client to be disconnected from the network. Phishing is an attack type that is target at all users, not just wireless ones

23
Q

Which of the following are not considered to be denial-of-service (DoS) attacks? (Choose all correct answers.)

An intruder breaks into a company’s datacenter and smashes their web servers with a sledgehammer.

An attacker uses the ping command with the -t parameter to send a continuous stream of large ICMP packets to a specific server.

An attacker captures the packets transmitted to and from a domain controller to obtain encrypted passwords.

An attacker connects a rogue access point to a company’s wireless network, using their SSID in the hope of attracting their users.

A

An attacker captures the packets transmitted to and from a domain controller to obtain encrypted passwords.

An attacker connects a rogue access point to a company’s wireless network, using their SSID in the hope of attracting their users.

A denial-of-service (DoS) attack is one designed to prevent a target from fulfilling its function. While ping floods are a common form of server DoS attacks, physically damaging the server hardware also prevents it from performing its function. Therefore, this too is a type of DoS attack. Capturing packets and rogue access points are not typically described as DoS attacks

24
Q

In the hacker subculture, which of the following statements best describes a zombie?

A computer that is remotely controllable because it has been infected by malware

A computer that is no longer functioning because it is the target of a denial-of-service (DoS) attack

A user that has fallen victim to a phishing attack

A

A computer that is remotely controllable because it has been infected by malware

A zombie is a computer that has been infected by malware—usually some form of Trojan—which an attacker can control remotely, causing the computer to flood a target system with traffic. An attack using multiple zombies is known as a distributed denial-of-service (DDoS) attack. The other options are not examples of zombies

25
Q

Which of the following statements best describes a ransomware attack?

A website is rendered inaccessible by a denial-of-service (DoS) attack until its owner agrees to pay a fee

A user’s access to a specific resource, such as a bank’s website, is blocked until the user pays a fee.

A message appears on a user’s screen, stating that system is locked and will only be released on payment of a fee.

A

A message appears on a user’s screen, stating that system is locked and will only be released on payment of a fee.

Ransomware is a type of attack in which a user’s access to his or her computer or data is blocked unless a certain amount of money is paid to the attacker. The blockages can vary from simple screen locks to data encryption